Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

nvd логотип

CVE-2012-0465

Опубликовано: 27 апр. 2012
Источник: nvd
CVSS2: 4.3
EPSS Низкий

Описание

Bugzilla 3.5.x and 3.6.x before 3.6.9, 3.7.x and 4.0.x before 4.0.6, and 4.1.x and 4.2.x before 4.2.1, when the inbound_proxies option is enabled, does not properly validate the X-Forwarded-For HTTP header, which allows remote attackers to bypass the lockout policy via a series of authentication requests with (1) different IP address strings in this header or (2) a long string in this header.

Уязвимые конфигурации

Конфигурация 1

Одно из

cpe:2.3:a:mozilla:bugzilla:3.5.1:*:*:*:*:*:*:*
cpe:2.3:a:mozilla:bugzilla:3.5.2:*:*:*:*:*:*:*
cpe:2.3:a:mozilla:bugzilla:3.5.3:*:*:*:*:*:*:*
cpe:2.3:a:mozilla:bugzilla:3.6.0:*:*:*:*:*:*:*
cpe:2.3:a:mozilla:bugzilla:3.6.1:*:*:*:*:*:*:*
cpe:2.3:a:mozilla:bugzilla:3.6.2:*:*:*:*:*:*:*
cpe:2.3:a:mozilla:bugzilla:3.6.3:*:*:*:*:*:*:*
cpe:2.3:a:mozilla:bugzilla:3.6.4:*:*:*:*:*:*:*
cpe:2.3:a:mozilla:bugzilla:3.6.5:*:*:*:*:*:*:*
cpe:2.3:a:mozilla:bugzilla:3.6.6:*:*:*:*:*:*:*
cpe:2.3:a:mozilla:bugzilla:3.6.7:*:*:*:*:*:*:*
cpe:2.3:a:mozilla:bugzilla:3.6.8:*:*:*:*:*:*:*
cpe:2.3:a:mozilla:bugzilla:3.7.1:*:*:*:*:*:*:*
cpe:2.3:a:mozilla:bugzilla:3.7.2:*:*:*:*:*:*:*
cpe:2.3:a:mozilla:bugzilla:3.7.3:*:*:*:*:*:*:*
cpe:2.3:a:mozilla:bugzilla:4.0.1:*:*:*:*:*:*:*
cpe:2.3:a:mozilla:bugzilla:4.0.2:*:*:*:*:*:*:*
cpe:2.3:a:mozilla:bugzilla:4.0.3:*:*:*:*:*:*:*
cpe:2.3:a:mozilla:bugzilla:4.0.4:*:*:*:*:*:*:*
cpe:2.3:a:mozilla:bugzilla:4.0.5:*:*:*:*:*:*:*
cpe:2.3:a:mozilla:bugzilla:4.1.1:*:*:*:*:*:*:*
cpe:2.3:a:mozilla:bugzilla:4.1.2:*:*:*:*:*:*:*
cpe:2.3:a:mozilla:bugzilla:4.1.3:*:*:*:*:*:*:*
cpe:2.3:a:mozilla:bugzilla:4.2:*:*:*:*:*:*:*
cpe:2.3:a:mozilla:bugzilla:4.2:rc1:*:*:*:*:*:*
cpe:2.3:a:mozilla:bugzilla:4.2:rc2:*:*:*:*:*:*

EPSS

Процентиль: 47%
0.00243
Низкий

4.3 Medium

CVSS2

Дефекты

CWE-264

Связанные уязвимости

ubuntu
почти 14 лет назад

Bugzilla 3.5.x and 3.6.x before 3.6.9, 3.7.x and 4.0.x before 4.0.6, and 4.1.x and 4.2.x before 4.2.1, when the inbound_proxies option is enabled, does not properly validate the X-Forwarded-For HTTP header, which allows remote attackers to bypass the lockout policy via a series of authentication requests with (1) different IP address strings in this header or (2) a long string in this header.

debian
почти 14 лет назад

Bugzilla 3.5.x and 3.6.x before 3.6.9, 3.7.x and 4.0.x before 4.0.6, a ...

github
почти 4 года назад

Bugzilla 3.5.x and 3.6.x before 3.6.9, 3.7.x and 4.0.x before 4.0.6, and 4.1.x and 4.2.x before 4.2.1, when the inbound_proxies option is enabled, does not properly validate the X-Forwarded-For HTTP header, which allows remote attackers to bypass the lockout policy via a series of authentication requests with (1) different IP address strings in this header or (2) a long string in this header.

EPSS

Процентиль: 47%
0.00243
Низкий

4.3 Medium

CVSS2

Дефекты

CWE-264